Your message dated Thu, 12 Jun 2008 16:23:52 +0200 with message-id <20080612142352.GA5342@wavehammer.waldi.eu.org> and subject line Re: Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data has caused the Debian Bug report #485944, regarding net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 485944: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485944 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data
- From: Nico Golde <nion@debian.org>
- Date: Thu, 12 Jun 2008 15:20:06 +0200
- Message-id: <[🔎] 20080612132006.GA20248@ngolde.de>
Package: linux-2.6 Version: 2.6.22-6.lenny1 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2008-1673[0]: | The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 | and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic | modules; and (b) the gxsnmp package; does not properly validate length | values during decoding of ASN.1 BER data, which allows remote | attackers to cause a denial of service (crash) or execute arbitrary | code via (1) a length greater than the working buffer, which can lead | to an unspecified overflow; (2) an oid length of zero, which can lead | to an off-by-one error; or (3) an indefinite length for a primitive | encoding. Patches are linked from the mitre site but I guess you will update to 2.6.25.5 anyway. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673 http://security-tracker.debian.net/tracker/CVE-2008-1673 -- Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.Attachment: pgpjPwcwv3EsZ.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 485944-done@bugs.debian.org
- Subject: Re: Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data
- From: Bastian Blank <waldi@debian.org>
- Date: Thu, 12 Jun 2008 16:23:52 +0200
- Message-id: <20080612142352.GA5342@wavehammer.waldi.eu.org>
- In-reply-to: <[🔎] 20080612132006.GA20248@ngolde.de>
- References: <[🔎] 20080612132006.GA20248@ngolde.de>
Version: 2.6.25-5 On Thu, Jun 12, 2008 at 03:20:06PM +0200, Nico Golde wrote: > CVE-2008-1673[0]: Fixed. Bastian -- In the strict scientific sense we all feed on death -- even vegetarians. -- Spock, "Wolf in the Fold", stardate 3615.4
--- End Message ---